Which of the following is a technique commonly used by attackers to exploit application vulnerabilities?
Data warehousing
SQL injection
Cloud computing

Application Security Exercises are loading ...